show episodes
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Late night transmissions of industrial/post-industrial, EBM, power electronics, synthpunk, coldwave/minimal wave, no wave and noise rock, darkwave, dark ambient, the experimental sounds of inner and outer space and more. Airs Sundays at 10 PM-1 AM CT on KUHS-LP 102.5 FM and at kuhsradio.org.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

Unsubscribe
Unsubscribe
Mensual
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Mensual+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

Unsubscribe
Unsubscribe
Mensual+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Artwork

1
Automation Chat

The Journal From Rockwell Automation and Our PartnerNetwork

Unsubscribe
Unsubscribe
Semanalmente
 
Winner of the 2022, 2023 & 2024 Apex Awards of Excellence for Best Podcast. Join Executive Editor Theresa Houck for Automation Chat, where she talks with industrial automation leaders, executives, and practitioners for their insights about technologies and trends affecting manufacturing and industrial automation professionals. Published by The Journal From Rockwell Automation and Our PartnerNetwork magazine (http://rok.auto/thejournal). We chat about digital transformation, analytics and inf ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

Unsubscribe
Unsubscribe
Mensual
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join John Vecchi as he speaks with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security a ...
  continue reading
 
Loading …
show series
 
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
  continue reading
 
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
  continue reading
 
** Named Best Podcast 3 Consecutive Years! 2022-2024 Apex Awards of Publication Excellence. In this episode, we’re doing something a little different. Occasionally, we like to share a guest episode from another great podcast. This episode is from our sister publication Control magazine and its podcast called, “Control Intelligence.” Control magazin…
  continue reading
 
On Oct. 1, 2024, an international law enforcement coalition announced the disruption of a senior member of INDRIK SPIDER, who was also an affiliate of the BITWISE SPIDER ransomware as a service operation. CrowdStrike often works with law enforcement to identify, track and stop cyber threats, and we played a key role in this operation. In this episo…
  continue reading
 
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos, points out that IoT devices, big and small, create an outsized threat to any organization. And that’s why IoT vendors need to secure these devices, e…
  continue reading
 
** Named “Best Podcast” for 3 Consecutive Years! 2022-2024 Apex Awards of Publication Excellence. In our award-winning “Automation Chat" podcast, “Automation & Manufacturing News, October 2024,” learn about the $2 million IEEE Medal of Honor, and Food Traceability Innovator and World’s Most Ethical Companies award winners; and the ISO and UNDP’s in…
  continue reading
 
The kernel is the brain of the operating system. It controls everything that happens on a computer and has full access to the hardware and all system resources. Though it has a small code base, the kernel plays a critical role in how systems and applications operate, interact and stay secure. Due to the current architecture and design of Windows sy…
  continue reading
 
** 3 Consecutive Awards for Best Podcast, 2022 - 2024 APEX Awards of Publication Excellence. In this episode, The Journal’s Executive Editor Theresa Houck brings the written word to life by reading the article, “HMI Helps With the Heavy Lifting.” It’s written by Susan Burtch, Lead Commercial Portfolio Manager of, Visualization Software at Rockwell …
  continue reading
 
Secure Access Service Edge, or SASE, brings together networking and cloud-delivered security services. On today’s Tech Bytes podcast we with talk with sponsor Fortinet about Unified SASE; that is, where a single provider offers both the networking and cloud elements of the service. We discuss essential elements of Unified SASE, Fortinet’s notion of…
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
Political hacktivism once mainly focused on website defacement. Now it has shifted to targeting physical devices, affecting critical infrastructure such as water treatment plants. At Black Hat USA 2024, Noam Moshe from Claroty highlighted how the HMIs in PLC devices from Israeli manufacturers may be susceptible to political attacks by nation-state …
  continue reading
 
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
  continue reading
 
** Named “Best Podcast” for 3 Consecutive Years! 2022-2024 Apex Awards of Publication Excellence. In this episode of “Automation Chat," Executive Editor Theresa Houck reviews news in industrial automation and manufacturing. Learn about market trends in OT cybersecurity and in ultrasonic flowmeters; the role of AC drives for energy savings; and what…
  continue reading
 
Today on the Tech Bytes podcast we talk about GenAI apps. From search to software development to video creation, Generative AI tools are widely available as standalone apps and are being bundled into enterprise applications. Whether you want them or not, GenAI apps are out there and running wild. On today’s show, sponsored by Palo... Read more »…
  continue reading
 
Episode 168 features Lewis Martin from LMC, Lawrence Trifiletti from LONG, and Nicholas Gayeski from Clockworks. This conversation explores the state of the talent in the industry . Enjoy! Find full show notes and episode transcript on The Nexus Podcast: Episode 168 webpage. Sign-up (or refer a friend!) to the Nexus Newsletter. Learn more about The…
  continue reading
 
Welcome to 10 Questions to Cyber Resilience, presented by Assurance IT. In this bi-monthly series, we dive into the strategies and practices IT leaders use to enhance their cybersecurity. Each episode brings you closer to mastering cyber resilience through engaging interviews with industry experts. In this episode, we sit down with Chris Catanzaro,…
  continue reading
 
In this episode, Executive Editor Theresa Houck tells you what topics we’re covering in the next edition of The Journal From Rockwell Automation and Our PartnerNetwork magazine — our October issue. Our print magazine mails October 15, and our digital issue launches October 26. Learn about upcoming stories on: How to modernize plant operations. What…
  continue reading
 
Next week marks the start of Fal.Con 2024. CrowdStrike’s annual conference brings together cybersecurity leaders and practitioners, as well as our customers and partners, in Las Vegas for four days of keynotes, breakout sessions, workshops and demos. Adam and Cristian will both be speaking at this year’s show. In this episode, they share the talks …
  continue reading
 
What if you could build your own embedded security tools, glitching devices for a fraction of the cost that you might expect. Like having a $150,000 laser setup for less than $500. A talk at Black Hat USA 2024 says you can. Sam Beaumont (Panth13r), Director of Transportation, mobility and cyber physical systems at NetSPI, and Larry Trowell (patch),…
  continue reading
 
In this episode of our “Automation Chat” podcast, Executive Editor Theresa Houck chats with Todd Gilliam, North American CPG Industry Leader at Rockwell Automation, and Monté Vander Velde, Senior Project Manager with CRB Group. Both companies recently released comprehensive reports: one about the consumer packaged goods industry, and one focused on…
  continue reading
 
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
  continue reading
 
Today on the Tech Bytes podcast: network observability. SuzieQ is an open-source project that collects, normalizes, stores, and analyzes multi-vendor network data. This data becomes a foundation for network observability and automation. We talk with Dinesh Dutt, creator of SuzieQ and founder of Stardust Systems, which makes a commercial version of …
  continue reading
 
Episode 167 features George Garth from Harris Capital, Justin Anders from COMMSecurity, and Matthew Taylor from NDY and is our 12th episode in the Case Study series looking at real-life, large-scale deployments of smart building technologies. These are not marketing fluff stories, these are lessons from leaders that others can put into use in their…
  continue reading
 
In this episode of our “Automation Chat” podcast from The Journal From Rockwell Automation and Our PartnerNetwork magazine, Executive Editor Theresa Houck chats with Ashley David, Product Marketing Manager for Level and Pressure Equipment at Endress+Hauser USA. They discuss: What exactly “smart instrumentation” is in process automation. Where the i…
  continue reading
 
For students aspiring to work in cybersecurity, sitting in a classroom isn’t enough to gain the skills and experience they need to succeed. Industry internships are invaluable opportunities to learn how security pros operate in the real world and understand the responsibilities each role requires. CrowdStrike’s University Program welcomes interns a…
  continue reading
 
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
  continue reading
 
Too few vulnerabilities in industrial control systems (ICS) are assigned CVEs because of client non-disclosure agreements. This results in repeatedly discovering the same vulnerabilities for different clients, especially in critical infrastructure. Don C. Weber from IOActive shares his experiences as an ICS security professional and suggests improv…
  continue reading
 
In this episode of “Automation Chat," Executive Editor Theresa Houck highlights news in industrial automation and manufacturing. Learn about the size of the U.S. manufacturing industry; trends in the oil & gas, modular robotics, batch control systems and industrial networks markets; and how companies are using AI. Also learn about achievements by E…
  continue reading
 
Today on the Tech Bytes podcast we talk cloud storage. More specifically, we dive into why it’s time for NFS to sail off into the sunset, particularly for cloud datasets. Our guest is Tom Lyon, an industry legend who has delivered a talk entitled “NFS Must Die.” We talk with Tom about the strengths and weaknesses of NFS, the... Read more »…
  continue reading
 
FAMOUS CHOLLIMA, a new adversary CrowdStrike is tracking, has recently made headlines for its insider threat activity. In April 2024, CrowdStrike Services responded to the first of several incidents in which FAMOUS CHOLLIMA threat actors targeted 30+ US-based companies. The insiders claimed to be US residents and were hired for remote IT positions,…
  continue reading
 
In this episode, The Journal’s Executive Editor Theresa Houck brings the written word to life by reading the case study, “How a Craft Brewery Switched from Bottles to Cans.” It explains how Lakefront Brewery used updated PLCs, drives and HMIs to switch its operation to cans while also improving visibility and production. Resources from this episode…
  continue reading
 
In this interview, we sat down with Greg Smith (Head of Global Product and Solution Marketing, Certinia) to get his insights into the stages of data maturity within the AI adoption journey. Greg advices that a key distinction in the nature of data handling between generative and predictive AI. Unlike predictive AI, which primarily analyzes existing…
  continue reading
 
We speak with Nick McKenzie, CI&SO and Sunil Joshi, Head of Digital & Communication Solutions, APJC, Orange Business about the CISO perspectives in the Asia Pacific Region. #mysecuritytv #bugcrowd For the full interview and to join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/…
  continue reading
 
Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain defence and Third Party Risk Management (TPRM). To join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/ #bugcrowd #mysecuritytvPor MySecurity Media
  continue reading
 
At DEF CON 32, in the ICS village, researchers disclosed vulnerabilities in home and commercial solar panel systems that could potentially disrupt the grid. Dan Berte, Director of IoT security for Bitdefender, discusses his more than a decade in IoT, how the vendor maturity often isn’t there for our smart TVs or even for our solar panels, so report…
  continue reading
 
In this episode of our “Automation Chat” podcast from The Journal From Rockwell Automation and Our PartnerNetwork magazine, Executive Editor Theresa Houck chats with Dave Kang, Advisory Solutions Architect at Dragos and Kamil Karmali, Senior Global Commercial Manager, Cybersecurity Services at Rockwell Automation. Get nuts-and-bolts, practical info…
  continue reading
 
Unlock the secrets of effective threat management with cybersecurity experts plus representatives from the Hacker community. This series will dive into the realm of cybersecurity and cybercrime analytics as our line-up of hackers and technologists debate the crucial role ethical hacking plays in fortifying digital defences. This includes exploring …
  continue reading
 
Hot on the heels of Bugcrowd recently achieving Unicorn status, following their recent USD $102 million fund raise, Bugcrowd's CEO Dave Gerry and founder and Chief Strategy Officer, Casey Ellis outline Bugcrowd’s vision for the future and plans for growth and expansion throughout the Asia Pacific region in 2024/5 and beyond. Dave Gerry has been in …
  continue reading
 
Prior to Joining Seaco as CIO, Damian Leach held the position of Chief Technology Officer for Workday Asia Pacific and Japan. Prior to his CTO position at Workday Damian spent 13 years in the Banking and Finance industry in Global Technology roles, most recently working for Standard Chartered Bank based in Singapore. Damian led the Digital Transfor…
  continue reading
 
In this episode, The Journal’s Managing Editor Amanda Joshi brings the written word to life by reading the article, “10 Electrical Safety Mistakes to Avoid,” from Fluke Corp. Get tips about personal protective equipment (PPE), electrical testing tools, testing leads, fuses, lockout/tagout (LOTO) and more. Resources from the episode: Read the articl…
  continue reading
 
Loading …

Guia de referencia rapida